Skip to content

Instantly share code, notes, and snippets.

View sboardwell's full-sized avatar

Steve Boardwell sboardwell

  • CloudBees
  • Berlin
View GitHub Profile
pipeline {
options { ... }
parameters { ... }
agent { ... }
stages {
stage('Test') {
when {
jenkins:
Master:
Image: my-company/my-project/jenkins-x-image
ImageTag: 0.0.70-2
Persistence:
mounts:
- name: jenkins-security-secrets
mountPath: /etc/jenkins-secrets
readOnly: true
volumes:
jenkins:
Master:
Image: my-company/my-project/jenkins-x-image
ImageTag: 0.0.70-2
Persistence:
mounts:
- name: jenkins-security-secrets
mountPath: /etc/jenkins-secrets
readOnly: true
volumes:
$ cat google-oauth-config
...someClientID...
...someClientSecret...
$ cat authz_strategy_config
{
"strategy": "GlobalMatrixAuthorizationStrategy",
"user_permissions": {
"authenticated": [
#!/usr/bin/env bash
# Execute with:
# ./refresh-jx-platform.sh
# or pass the JX_VERSION
# JX_VERSION=2.3.333 ./refresh-jx-platform.sh
set -eu
export JX_HOME=$(mktemp -d)
if [ -z "${JX_VERSION:-}" ]; then
@sboardwell
sboardwell / myvalues.yaml
Created August 5, 2019 20:20
Adding the Jenkins docker image.
jenkins:
Master:
Image: my-reg/my-company/jenkins-x-image
ImageTag: 0.0.70-1
// SecurityRealm
import jenkins.model.Jenkins
import hudson.security.SecurityRealm
import org.jenkinsci.plugins.GithubSecurityRealm
clientID = null
clientSecret = null
securityRealm = null
// secret sanity check
@sboardwell
sboardwell / add_default_ssl_cert.sh
Last active June 25, 2019 20:46
add_default_ssl_cert.sh
die() { echo "$@" 1>&2 ; exit 1; }
dieGracefully() { echo "$@" 1>&2 ; exit 0; }
confirm () {
# call with a prompt string or use a default
read -p "${1:-Are you sure?} [y/N]" -n 1 -r
[ -n "$REPLY" ] && echo # (optional) move to a new line
if [[ ! $REPLY =~ ^[Yy]$ ]]; then
dieGracefully "Received '${REPLY:-N}'. ${2:-Exiting gracefully}."
$ kubectl -n kube-system get certificates
NAME READY SECRET AGE
jxing-nginx-ingress-controller-wildcard-prod True jxing-nginx-ingress-controller-wildcard-prod-tls 5d
jxing-nginx-ingress-controller-wildcard-staging True jxing-nginx-ingress-controller-wildcard-staging-tls 11d
add_certificates() {
local envType=$1
local secretName ns
kubectl apply -f <(sops -d cert-manager-utils/01-clouddns-service-account.yaml)
kubectl apply -f <(sops -d cert-manager-utils/01-cloudflare-api-key.yaml)
kubectl apply -f cert-manager-utils/02-clusterissuer-${envType}.yaml
kubectl apply -f cert-manager-utils/03-cluster-certificate-${envType}.yaml
# get the secret name
secretName=$(cat cert-manager-utils/03-cluster-certificate-${envType}.yaml | docker run -i --rm evns/yq yq -r '.spec.secretName')